List Vulnerability

Acts as a centralized vulnerability repository. It consolidates findings from different scans (manual, automated, API) and external tools integrated via API, serving as the main vulnerability database for consultants. 

Accessing Vulnerability Listing   
 

  • Navigate to WAS MSSP Consultant Admin. 
  • Click List Vulnerability

 A screenshot of a computer

AI-generated content may be incorrect. 

A screenshot of a computer

AI-generated content may be incorrect. 

Parameters 

Description 

Vulnerability ID Vulnerbaility ID is a unique system-generated identifier for the integration  

Vulnerability Title 

Vulnerability Name 
OWASP Category 
CWE ID & Name 

Contains complete details of the vulnerability for identification and classification. 
Severity 
Vulnerability Type 
Scanner Type 
Shows the criticality of the vulnerability, its type/category and which scanner/tool detected it. 

PCI Severity 

PCI Flag 
PCI Compliance 

Displays PCI DSS impact, indicating severity, whether it affects PCI compliance, and the compliance status. 
Status  Reflects the status of the vulnerability(Active, Inactive or Whitelist) 
Created Modified  Records the creation and last modification dates for tracking and audit purposes. 
Action Administrative controls for managing the vulnerability (View & Edit). 

Filtering and Search Controls 

Filters allow narrowing down the displayed vulnerabilities for quick lookups and efficient management. 

A screenshot of a computer

AI-generated content may be incorrect. 

Search Control 

Description 

Vulnerability ID(s) Enter one or multiple IDs to directly retrieve specific vulnerabilities. 
Vulnerability Title Search by the descriptive title of a vulnerability to locate known vulnerabilities quickly. 
Vulnerability Name Filter by standardized vulnerability names (e.g., SQL Injection, XSS) to find related issues. 
Severity Select the criticality level (Info, Low, Medium, High, Critical) to focus on high-risk vulnerabilities. 
Search Date Dropdown to filter vulnerabilities based on lifecycle dates such as Created On or Modified On  
Select Period Predefined time ranges like Today, Yesterday, or a Custom range to narrow results. 
From Date / To Date Specify a custom date range to refine search results within lifecycle or scan dates. 
Vulnerability Type Filter by category/type of vulnerability  
Status Choose the resolution state (Active, inactive or whitelist) to view current vulnerability conditions. 
OWASP Category ID Filter vulnerabilities based on OWASP Top 10 classification. 
CWE ID Narrow results using specific CWE identifiers for precise vulnerability tracking. 

 

Steps: 

  • Enter one or more desired fields (E.g. Vulnerbaility ID). 
  • Click Search to apply filters and refresh records. 
  • Click Reset to clear all filters and return to the default view. 

A screenshot of a computer

AI-generated content may be incorrect.Action 

Click View to open detailed information about the vulnerability, including URL, request/response, CVSS score, business risks and recommendations. 

A table with text on it

AI-generated content may be incorrect. 

The View Vulnerability window will open in read-only mode. 

A screenshot of a computer

AI-generated content may be incorrect. 

Click Edit to update details of the finding (severity, description, notes). 

A table with text on it

AI-generated content may be incorrect. 

The Edit Vulnerability window will open for making changes 

A screenshot of a computer

AI-generated content may be incorrect. 

Make the necessary changes and Click Save to apply them. 

Was this helpful?